SlideShare a Scribd company logo
1 of 43
Chapter 11 Data Link Control and Protocols
11.1  Flow and Error Control Flow Control Error Control
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
Error control in the data link layer is based on automatic repeat request, which is the retransmission of data.  Note :
11.2  Stop-and-Wait ARQ Operation Bidirectional Transmission
11.1   Normal operation
11.2   Stop-and-Wait ARQ, lost frame
11.3   Stop-and-Wait ARQ, lost ACK frame
In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
11.4   Stop-and-Wait ARQ, delayed ACK
Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost.  Note :
11.5   Piggybacking
11.3  Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
11.6   Sender sliding window
11.7   Receiver sliding window
11.8   Control variables
11.9   Go-Back-N ARQ, normal operation
11.10   Go-Back-N ARQ, lost frame
11.11   Go-Back-N ARQ: sender window size
In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
11.4  Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
11.12   Selective Repeat ARQ, sender and receiver windows
11.13   Selective Repeat ARQ, lost frame
In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m .  Note :
11.14   Selective Repeat ARQ, sender window size
Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1    10 6     20    10 -3  = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
11.5  HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
11.15   NRM
11.16   ABM
11.17   HDLC frame
11.18   HDLC frame types
11.19   I-frame
11.20   S-frame control field in HDLC
11.21   U-frame control field in HDLC
Table 11.1  U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
11.22   Example 3
Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
11.23   Example 4
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the  data for a flag. Note :
11.24   Bit stuffing and removal
11.25   Bit stuffing in HDLC

More Related Content

What's hot

Flow control and error control
Flow control and error controlFlow control and error control
Flow control and error control
BHUVIJAYAVELU
 

What's hot (20)

Flow control main
Flow control mainFlow control main
Flow control main
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Flow Control
Flow ControlFlow Control
Flow Control
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Error control
Error controlError control
Error control
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 
Flow control and error control
Flow control and error controlFlow control and error control
Flow control and error control
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
HDLC
HDLCHDLC
HDLC
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 

Similar to Ch 11

3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
kavish dani
 
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
nanisrikar276711
 

Similar to Ch 11 (20)

DLL Part_1.ppt
DLL Part_1.pptDLL Part_1.ppt
DLL Part_1.ppt
 
chapter 11(Data link Control)in CN .ppt
chapter 11(Data link Control)in CN  .pptchapter 11(Data link Control)in CN  .ppt
chapter 11(Data link Control)in CN .ppt
 
dl_frames.ppt
dl_frames.pptdl_frames.ppt
dl_frames.ppt
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Unit I Data Link Control.ppt
Unit I Data Link Control.pptUnit I Data Link Control.ppt
Unit I Data Link Control.ppt
 
Ch11
Ch11Ch11
Ch11
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Ch11
Ch11Ch11
Ch11
 
Networks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxNetworks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptx
 
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlSYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).ppt
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.ppt
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Ch11
Ch11Ch11
Ch11
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
 

More from soumya ranjan mohanty (20)

Ch 30
Ch 30Ch 30
Ch 30
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 26
Ch 26Ch 26
Ch 26
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 25
Ch 25Ch 25
Ch 25
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 15
Ch 15Ch 15
Ch 15
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Ch 11

  • 1. Chapter 11 Data Link Control and Protocols
  • 2. 11.1 Flow and Error Control Flow Control Error Control
  • 3. Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
  • 4. Error control in the data link layer is based on automatic repeat request, which is the retransmission of data. Note :
  • 5. 11.2 Stop-and-Wait ARQ Operation Bidirectional Transmission
  • 6. 11.1 Normal operation
  • 7. 11.2 Stop-and-Wait ARQ, lost frame
  • 8. 11.3 Stop-and-Wait ARQ, lost ACK frame
  • 9. In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
  • 10. 11.4 Stop-and-Wait ARQ, delayed ACK
  • 11. Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost. Note :
  • 12. 11.5 Piggybacking
  • 13. 11.3 Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
  • 14. 11.6 Sender sliding window
  • 15. 11.7 Receiver sliding window
  • 16. 11.8 Control variables
  • 17. 11.9 Go-Back-N ARQ, normal operation
  • 18. 11.10 Go-Back-N ARQ, lost frame
  • 19. 11.11 Go-Back-N ARQ: sender window size
  • 20. In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
  • 21. 11.4 Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
  • 22. 11.12 Selective Repeat ARQ, sender and receiver windows
  • 23. 11.13 Selective Repeat ARQ, lost frame
  • 24. In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m . Note :
  • 25. 11.14 Selective Repeat ARQ, sender window size
  • 26. Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1  10 6  20  10 -3 = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
  • 27. Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
  • 28. 11.5 HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
  • 29. 11.15 NRM
  • 30. 11.16 ABM
  • 31. 11.17 HDLC frame
  • 32. 11.18 HDLC frame types
  • 33. 11.19 I-frame
  • 34. 11.20 S-frame control field in HDLC
  • 35. 11.21 U-frame control field in HDLC
  • 36. Table 11.1 U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
  • 37. Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
  • 38. 11.22 Example 3
  • 39. Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
  • 40. 11.23 Example 4
  • 41. Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the data for a flag. Note :
  • 42. 11.24 Bit stuffing and removal
  • 43. 11.25 Bit stuffing in HDLC